Function Index
Symbols | A | B | C | D | E | F | G | H | I | J | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y
ABS()
ADDDATE()
ADDTIME()
AES_DECRYPT()
- Section 12.13, “Encryption and Compression Functions”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 12.19.4, “MySQL Enterprise Encryption Function Descriptions”
- Section 5.1.7, “Server System Variables”
- Section 6.3.4, “SSL Library-Dependent Capabilities”
- Section 1.4, “What Is New in MySQL 5.7”
AES_ENCRYPT()
- Section 12.13, “Encryption and Compression Functions”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 12.19.4, “MySQL Enterprise Encryption Function Descriptions”
- Section 5.1.7, “Server System Variables”
- Section 6.3.4, “SSL Library-Dependent Capabilities”
- Section 1.4, “What Is New in MySQL 5.7”
ANY_VALUE()
ASYMMETRIC_DECRYPT()
ASYMMETRIC_DERIVE()
ASYMMETRIC_ENCRYPT()
ASYMMETRIC_SIGN()
ASYMMETRIC_VERIFY()
AVG()
BENCHMARK()
BIT_AND()
BIT_COUNT()
BIT_LENGTH()
BIT_OR()
BIT_XOR()
CAST()
- Section 12.12, “Bit Functions and Operators”
- Section 9.1.5, “Bit-Value Literals”
- Section 12.10, “Cast Functions and Operators”
- Section 12.7.3, “Character Set and Collation of Function Results”
- Section 12.3.2, “Comparison Functions and Operators”
- Section 11.2.8, “Conversion Between Date and Time Types”
- Section 12.6, “Date and Time Functions”
- Section 9.5, “Expressions”
- Section 12.17.2, “Functions That Create JSON Values”
- Section 9.1.4, “Hexadecimal Literals”
- Section 1.8.2, “MySQL Differences from Standard SQL”
- Section 11.5, “The JSON Data Type”
- Section 12.2, “Type Conversion in Expression Evaluation”
- Section 9.4, “User-Defined Variables”
CEILING()
CHAR()
CHAR_LENGTH()
CHARACTER_LENGTH()
CHARSET()
COERCIBILITY()
COLLATION()
COMPRESS()
CONCAT()
- Section 12.20.1, “Aggregate Function Descriptions”
- Section 12.10, “Cast Functions and Operators”
- Section 12.7.3, “Character Set and Collation of Function Results”
- Section 10.2.1, “Character Set Repertoire”
- Section 10.8.4, “Collation Coercibility in Expressions”
- Section 13.7.3.1, “CREATE FUNCTION Syntax for User-Defined Functions”
- Section 12.3.3, “Logical Operators”
- Section 1.8.1, “MySQL Extensions to Standard SQL”
- Section 5.1.10, “Server SQL Modes”
- Section 13.7.5.13, “SHOW CREATE VIEW Statement”
- Section 12.7, “String Functions and Operators”
- Section 24.31, “The INFORMATION_SCHEMA VIEWS Table”
- Section 12.2, “Type Conversion in Expression Evaluation”
- Section 12.11, “XML Functions”
CONCAT_WS()
CONNECTION_ID()
- Section 6.4.5.4, “Audit Log File Formats”
- Section 13.1.18.7, “CREATE TABLE and Generated Columns”
- Section 16.2.1.3, “Determination of Safe and Unsafe Statements in Binary Logging”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 12.15, “Information Functions”
- Section 13.7.6.4, “KILL Statement”
- Section 4.5.1.3, “mysql Client Logging”
- Section 13.7.5.29, “SHOW PROCESSLIST Statement”
- Section 24.18, “The INFORMATION_SCHEMA PROCESSLIST Table”
- Section 25.12.16.3, “The threads Table”
CONV()
CONVERT()
- Section 12.10, “Cast Functions and Operators”
- Section 10.3.8, “Character Set Introducers”
- Section 10.3.6, “Character String Literal Character Set and Collation”
- Section 12.3.2, “Comparison Functions and Operators”
- Section A.11, “MySQL 5.7 FAQ: MySQL Chinese, Japanese, and Korean Character Sets”
- Section 4.5.1.1, “mysql Client Options”
- Section 6.4.7.3, “Using MySQL Enterprise Data Masking and De-Identification”
CONVERT_TZ()
- Section 12.6, “Date and Time Functions”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 8.3.11, “Indexed Lookups from TIMESTAMP Columns”
- Section 13.3.5, “LOCK TABLES and UNLOCK TABLES Statements”
- Section 5.1.7, “Server System Variables”
- Section 5.4.3, “The General Query Log”
- Section 5.4.5, “The Slow Query Log”
ConvexHull()
COUNT()
- Section 12.20.1, “Aggregate Function Descriptions”
- Section 3.3.4.8, “Counting Rows”
- Section 13.7.3.1, “CREATE FUNCTION Syntax for User-Defined Functions”
- Section 8.2.1.15, “GROUP BY Optimization”
- Section 14.24, “InnoDB Restrictions and Limitations”
- Section 8.4.4, “Internal Temporary Table Use in MySQL”
- Section 21.1.7.3, “Limits Relating to Transaction Handling in NDB Cluster”
- Section 12.21, “Miscellaneous Functions”
- Section 1.8.1, “MySQL Extensions to Standard SQL”
- Section 21.3.3.9.3, “NDB Cluster Status Variables”
- Section 8.2.2.4, “Optimizing Derived Tables and View References with Merging or Materialization”
- Section B.4.4.3, “Problems with NULL Values”
- Section 5.1.10, “Server SQL Modes”
- Section 1.3.2, “The Main Features of MySQL”
- Section 23.5.3, “Updatable and Insertable Views”
- Section 8.2.1.1, “WHERE Clause Optimization”
CREATE_ASYMMETRIC_PRIV_KEY()
CREATE_ASYMMETRIC_PUB_KEY()
CREATE_DH_PARAMETERS()
crypt()
CURDATE()
CURRENT_DATE()
CURRENT_TIME
CURRENT_TIME()
CURRENT_TIMESTAMP
CURRENT_TIMESTAMP()
CURRENT_USER
- Section 13.7.1.1, “ALTER USER Statement”
- Section 13.1.12, “CREATE EVENT Statement”
- Section 13.1.16, “CREATE PROCEDURE and CREATE FUNCTION Statements”
- Section 13.1.20, “CREATE TRIGGER Statement”
- Section 13.1.21, “CREATE VIEW Statement”
- Section 6.2.3, “Grant Tables”
- Section 12.15, “Information Functions”
- Section 5.4.4.3, “Mixed Binary Logging Format”
- Section 16.4.1.15, “Replication and System Functions”
- Section 16.4.1.8, “Replication of CURRENT_USER()”
- Section 13.7.5.12, “SHOW CREATE USER Statement”
- Section 6.2.4, “Specifying Account Names”
- Section 23.6, “Stored Object Access Control”
CURRENT_USER()
- Section 6.2.5, “Access Control, Stage 1: Connection Verification”
- Section 13.7.1.1, “ALTER USER Statement”
- Section 6.4.5.4, “Audit Log File Formats”
- Section 6.4.2.1, “Connection-Control Plugin Installation”
- Section 13.1.12, “CREATE EVENT Statement”
- Section 13.1.16, “CREATE PROCEDURE and CREATE FUNCTION Statements”
- Section 13.1.18.7, “CREATE TABLE and Generated Columns”
- Section 13.1.20, “CREATE TRIGGER Statement”
- Section 13.1.21, “CREATE VIEW Statement”
- Section 6.4.4.8, “General-Purpose Keyring Key-Management Functions”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 28.2.4.9.4, “Implementing Proxy User Support in Authentication Plugins”
- Section 12.15, “Information Functions”
- Section 5.4.4.3, “Mixed Binary Logging Format”
- Section 6.4.3.2, “Password Validation Plugin Options and Variables”
- Section 6.2.14, “Proxy Users”
- Section 16.4.1.15, “Replication and System Functions”
- Section 16.4.1.8, “Replication of CURRENT_USER()”
- Section 13.7.1.7, “SET PASSWORD Statement”
- Section 13.7.5.12, “SHOW CREATE USER Statement”
- Section 6.2.4, “Specifying Account Names”
- Section 6.2.18, “SQL-Based Account Activity Auditing”
- Section 23.6, “Stored Object Access Control”
- Section 28.3.2, “The Keyring Service”
- Section 10.2.2, “UTF-8 for Metadata”
- Section 28.2.4.9.1, “Writing the Server-Side Authentication Plugin”
CURTIME()
DATABASE()
- Section 16.1.6.4, “Binary Logging Options and Variables”
- Section 3.3.1, “Creating and Selecting a Database”
- Section 13.1.22, “DROP DATABASE Statement”
- Section 3.4, “Getting Information About Databases and Tables”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 12.15, “Information Functions”
- Section B.4.7, “Known Issues in MySQL”
- Section 10.2.2, “UTF-8 for Metadata”
DATE_ADD()
DATE_FORMAT()
DATE_SUB()
DATEDIFF()
DAY()
DAYNAME()
DAYOFMONTH()
DAYOFWEEK()
DAYOFYEAR()
DECODE()
DEFAULT()
DEGREES()
DES_DECRYPT()
DES_ENCRYPT()
ELT()
ENCODE()
ENCRYPT()
EXPORT_SET()
EXTRACT()
ExtractValue()
FLOOR()
FORMAT()
FOUND_ROWS()
- Section 16.2.1.1, “Advantages and Disadvantages of Statement-Based and Row-Based Replication”
- Section 16.2.1.3, “Determination of Safe and Unsafe Statements in Binary Logging”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 12.15, “Information Functions”
- Section 5.4.4.3, “Mixed Binary Logging Format”
- Section 16.4.1.15, “Replication and System Functions”
FROM_BASE64()
FROM_DAYS()
FROM_UNIXTIME()
GeomCollFromText()
GeomCollFromWKB()
GeometryCollection()
GeometryCollectionFromText()
GeometryCollectionFromWKB()
GeometryFromText()
GeometryFromWKB()
GeometryType()
GET_LOCK()
- Section 16.2.1.1, “Advantages and Disadvantages of Statement-Based and Row-Based Replication”
- Section 27.7.19, “C API Automatic Reconnection Control”
- Section 2.11.3, “Changes in MySQL 5.7”
- Section 13.1.12, “CREATE EVENT Statement”
- Section 16.2.1.3, “Determination of Safe and Unsafe Statements in Binary Logging”
- Section 23.4.1, “Event Scheduler Overview”
- Section 8.14.3, “General Thread States”
- Section 17.7.2, “Group Replication Limitations”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 8.11.1, “Internal Locking Methods”
- Section 13.7.6.4, “KILL Statement”
- Section 13.3.5, “LOCK TABLES and UNLOCK TABLES Statements”
- Section 12.14, “Locking Functions”
- Section 28.3.1.2.3, “Locking Service Monitoring”
- Section 8.11.4, “Metadata Locking”
- Section 27.7.6.3, “mysql_change_user()”
- Section 27.7.6.60, “mysql_reset_connection()”
- Section 16.4.1.15, “Replication and System Functions”
- Section 28.3.1, “The Locking Service”
- Section 25.12.12.1, “The metadata_locks Table”
- Section 26.4.4.14, “The ps_setup_save() Procedure”
gethostbyaddr()
gethostbyname()
gettimeofday()
GREATEST()
GROUP_CONCAT()
- Section 12.20.1, “Aggregate Function Descriptions”
- Section 8.4.4, “Internal Temporary Table Use in MySQL”
- Section B.4.7, “Known Issues in MySQL”
- Section 1.8.1, “MySQL Extensions to Standard SQL”
- Section 5.1.7, “Server System Variables”
- Section 11.5, “The JSON Data Type”
- Section 1.3.2, “The Main Features of MySQL”
GROUPING()
GTID_INTERSECTION_WITH_UUID
GTID_IS_DISJOINT
GTID_IS_DISJOINT_UNION
GTID_SUBSET()
GTID_SUBTRACT()
GTID_SUBTRACT_UUID
HEX()
- Section 9.1.5, “Bit-Value Literals”
- Section 12.7.3, “Character Set and Collation of Function Results”
- Section 10.3.6, “Character String Literal Character Set and Collation”
- Section 6.4.4.8, “General-Purpose Keyring Key-Management Functions”
- Section 9.1.4, “Hexadecimal Literals”
- Section 12.5.2, “Mathematical Functions”
- Section 12.21, “Miscellaneous Functions”
- Section A.11, “MySQL 5.7 FAQ: MySQL Chinese, Japanese, and Korean Character Sets”
- Section 12.7, “String Functions and Operators”
HOUR()
IF()
INSTR()
InteriorRingN()
IS_FREE_LOCK()
- Section 16.2.1.1, “Advantages and Disadvantages of Statement-Based and Row-Based Replication”
- Section 16.2.1.3, “Determination of Safe and Unsafe Statements in Binary Logging”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 12.14, “Locking Functions”
- Section 16.4.1.15, “Replication and System Functions”
IS_IPV4()
IS_IPV4_COMPAT()
IS_IPV4_MAPPED()
IS_IPV6()
IS_USED_LOCK()
- Section 16.2.1.1, “Advantages and Disadvantages of Statement-Based and Row-Based Replication”
- Section 16.2.1.3, “Determination of Safe and Unsafe Statements in Binary Logging”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 12.14, “Locking Functions”
- Section 16.4.1.15, “Replication and System Functions”
JSON_APPEND()
JSON_ARRAY()
JSON_ARRAY_APPEND()
JSON_ARRAY_INSERT()
JSON_ARRAYAGG()
JSON_CONTAINS()
JSON_CONTAINS_PATH()
JSON_DEPTH()
JSON_EXTRACT()
JSON_INSERT()
JSON_KEYS()
JSON_LENGTH()
JSON_MERGE()
JSON_MERGE_PATCH()
JSON_MERGE_PRESERVE()
JSON_OBJECT()
JSON_OBJECTAGG()
JSON_PRETTY()
JSON_QUOTE()
JSON_REMOVE()
JSON_REPLACE()
JSON_SEARCH()
JSON_SET()
JSON_STORAGE_SIZE()
JSON_TYPE()
JSON_UNQUOTE(
JSON_UNQUOTE()
JSON_VALID()
LAST_DAY()
LAST_INSERT_ID()
- Section 27.7.19, “C API Automatic Reconnection Control”
- Section 12.3.2, “Comparison Functions and Operators”
- Section 13.1.18, “CREATE TABLE Statement”
- Section 16.2.1.3, “Determination of Safe and Unsafe Statements in Binary Logging”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 27.7.20.3, “How to Get the Unique ID for the Last Inserted Row”
- Section 12.15, “Information Functions”
- Section 13.2.5.2, “INSERT ... ON DUPLICATE KEY UPDATE Statement”
- Section 13.2.5, “INSERT Statement”
- Section 13.3.5, “LOCK TABLES and UNLOCK TABLES Statements”
- Section 1.8.1, “MySQL Extensions to Standard SQL”
- Section 27.7.6.38, “mysql_insert_id()”
- Section 27.7.6.60, “mysql_reset_connection()”
- Section 27.7.10.16, “mysql_stmt_insert_id()”
- Section 21.4.24, “ndb_restore — Restore an NDB Cluster Backup”
- Section 16.4.1.1, “Replication and AUTO_INCREMENT”
- Section 16.4.1.15, “Replication and System Functions”
- Section 5.1.7, “Server System Variables”
- Section 23.2.4, “Stored Procedures, Functions, Triggers, and LAST_INSERT_ID()”
- Section 16.4.4, “Troubleshooting Replication”
- Section 23.5.3, “Updatable and Insertable Views”
- Section 3.6.9, “Using AUTO_INCREMENT”
LCASE()
LEAST()
LENGTH()
Length()
LineStringFromText()
LineStringFromWKB()
LOAD_FILE()
- Section 16.2.1.1, “Advantages and Disadvantages of Statement-Based and Row-Based Replication”
- Section 16.2.1.3, “Determination of Safe and Unsafe Statements in Binary Logging”
- Section 8.10.3.1, “How the Query Cache Operates”
- Section 13.2.7, “LOAD XML Statement”
- Section 5.4.4.3, “Mixed Binary Logging Format”
- Section 12.19.2, “MySQL Enterprise Encryption Usage and Examples”
- Section 6.2.2, “Privileges Provided by MySQL”
- Section 16.4.